Promiscuous Mode

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 849 Experts worldwide ranked by ideXlab platform

Rido Zulfahmi - One of the best experts on this subject based on the ideXlab platform.

  • penerapan inter vlan routing pada sistem jaringan di virtual machine yang berbasis Promiscuous Mode menggunakan ovs
    2019
    Co-Authors: Nyayu Yuliana Audisi, Huda Ubaya, Rido Zulfahmi
    Abstract:

    In the technological era many educational institutions , offices, and public implement a VLAN network system that works to creating logical networks. Although VLAN traffic is necessary to implement inter VLAN routing to multiconnection routers in the networks. This research using a virtual machines, Open vSwitch software is needed. Open vSwitch is a virtual switch software works to connects the virtual machine. On the networks virtual machine there is a Mode setting between interfaces called Promiscuous Mode that used to allow of reject data package enter the networks kernel. The purpose of this research is to implement inter VLAN routing using Open vSwitch on a virtual machine networks and using Promiscuous Mode. This research uses observation and literature method. The result of this research are virtual machine devices connected by Open vSwitch on inter VLAN routing network systems can be bridging networks and virtual machines with Promiscuous Mode.

  • PENERAPAN ACCESS CONTROL LIST (ACL) PADA JARINGAN VLAN BERBASIS Promiscuous Mode DI LINUX UBUNTU
    2018
    Co-Authors: Ajeng Ayu Pratiwi, Huda Ubaya, Rido Zulfahmi
    Abstract:

    Access Control List (ACL) is a method of selectivity to data packets that will be sent in to the intended address. The application of an Access Control List (ACL) network system on a Virtual Local Area Network (VLAN) network is currently idely usedbth in educational instutions, office, ect. A VLAN network is a group of devices on 1 or more LANs that are configured so that they can connect and communicate as if thet were connected to the same path when they are in different LAN segments. Openflow used in this study has as an Access Control List (ACL) same role, especially on ubuntu linux operating. Openflow is a pprotocol that allows a network to be programmed and design to manage and direct data packet traffic which will provide VLAN using ACL in OVS. The research is cloecly related ti the virtualization process that uses a virtual machine with supporting software, OVS. OVS is a virtual software that connects devices to a network system. On a computer network that is built using a virtual machine there is a controller interface that is a Promiscuous Modee which serves to allow and interceot every incoming data packet and read each data packet. The result of this study are virtua devices that are connected using OVS on a virtual machine network on an ACL network system by activating Promiscuous Mode.

  • penerapan virtual local area network menggunakan ovs pada jaringan virtual machine berbasis Promiscuous Mode
    2018
    Co-Authors: Dinda Yunafril, Huda Ubaya, Rido Zulfahmi
    Abstract:

    Penerapan sistem jaringan Virtual Local Area Network (VLAN) pada saat ini banyak dimanfaatkan oleh instansi pendidikan, ditempat umum, dan juga perkantoran. Pemanfaatan sistem jaringan ini memungkinkan untuk membagi suatu koneksi fisik pada sebuah LAN menjadi beberapa koneksi logika. Pada penelitian ini menggunakan virtual machine, maka untuk mendukung penerapan VLAN ini menggunakan OVS. OVS merupakan suatu software switch virtual yang berfungsi menghubungkan perangkat pada suatu sistem jaringan. Untuk sebuah jaringan komputer yang dibangun menggunakan virtual machine terdapat kontroler antarmuka yaitu Promiscuous Mode yang berfungsi untuk mengijinkan dan mencegat paket data yang masuk ke jaringan. Penelitian ini menggunakan metode observasi pada setiap pengerjaan dan pengujian, juga metode litelatur untuk memperoleh informasi. Hasil penelitian ini adalah perangkat virtual yang dihubungkan menggunakan OVS pada jaringan virtual machine pada sistem jaringan VLAN yang dapat menghubungkan jaringan dan mesin virtual dengan Promiscuous Mode.

Joo-sang Youn - One of the best experts on this subject based on the ideXlab platform.

  • Quick Local Repair Scheme using Adaptive Promiscuous Mode in Mobile Ad Hoc Networks
    2008
    Co-Authors: Joo-sang Youn
    Abstract:

    Abstract—In mobile ad hoc networks (MANETs), there is frequently disconnected a route consisting of multi-hop from a source to a destination because of the dynamic nature such as the topology change caused by nodes’ mobility. To overcome this situation, existing routing protocols for MANETs have performed route repair scheme to repair the disconnected route. However, existing reactive routing protocols have the problem which is that a source node unnecessarily performs re-discovers the whole path when just one node moves, even if the rest of path needs not to be re-arranged. Therefore, the time for re-discovery of the whole path may often take too long. To solve the problem, we propose a new local repair scheme using Promiscuous Mode. Our scheme is mainly composed of two parts: adaptive Promiscuous Mode and quick local repair scheme. Adaptive Promiscuous Mode is to repeat the switching processes between Promiscuous Mode and nonPromiscuous Mode to overcome energy limit caused by using Promiscuous Mode in overall time and quick local repair scheme is to fast perform the local re-route discovery process with the information of the active connection in the local area acquired by Promiscuous Mode. With simulation in the various number of connection, We demonstrate the better network performances achieved with the proposed schemes as compared with AODV as reference Model that do not provide local repair scheme. Index Terms—Local repair schemes, mobile ad hoc networks (MANETs), Promiscuous Mode. I

  • quick local repair scheme using adaptive Promiscuous Mode in mobile ad hoc networks
    2006
    Co-Authors: Joo-sang Youn, Jihoon Lee, Doohyun Sung, Chulhee Kang
    Abstract:

    In mobile ad hoc networks (MANETs), there is frequently disconnected a route consisting of multi- hop from a source to a destination because of the dynamic nature such as the topology change caused by nodes’ mobility. To overcome this situation, existing routing protocols for MANETs have performed route repair scheme to repair the disconnected route. However, existing reactive routing protocols have the problem which is that a source node unnecessarily performs re-discovers the whole path when just one node moves, even if the rest of path needs not to be re-arranged. Therefore, the time for re-discovery of the whole path may often take too long. To solve the problem, we propose a new local repair scheme using Promiscuous Mode. Our scheme is mainly composed of two parts: adaptive Promiscuous Mode and quick local repair scheme. Adaptive Promiscuous Mode is to repeat the switching processes between Promiscuous Mode and nonPromiscuous Mode to overcome energy limit caused by using Promiscuous Mode in overall time and quick local repair scheme is to fast perform the local re-route discovery process with the information of the active connection in the local area acquired by Promiscuous Mode. With simulation in the various number of connection, We demonstrate the better network performances achieved with the proposed schemes as compared with AODV as reference Model that do not provide local repair scheme.

  • a local repair scheme with adaptive Promiscuous Mode in mobile ad hoc networks
    2005
    Co-Authors: Doohyun Sung, Joo-sang Youn, Jihoon Lee, Chulhee Kang
    Abstract:

    In current routing protocols in ad hoc networks, a source node unnecessarily re-discovers the whole path when just one node moves, even if the rest of path needs not to be re-arranged. The time for re-discovery of the whole path may often take too long and affects the network efficiency adversely. In this paper, a local repair scheme has been proposed, where the source node recovers the route breakage caused by a shifting of node with an aid of adjacent node instead of re-routing the whole path. Adjacent nodes are under operation in adaptive Promiscuous Mode. Consequently, the proposed scheme has advantages in shortening the recovery time of the route breakage and in minimizing the energy consumption under Promiscuous Mode. The ns-2.27 simulator has been utilized for the evaluation of the proposed scheme.

Chulhee Kang - One of the best experts on this subject based on the ideXlab platform.

  • quick local repair scheme using adaptive Promiscuous Mode in mobile ad hoc networks
    2006
    Co-Authors: Joo-sang Youn, Jihoon Lee, Doohyun Sung, Chulhee Kang
    Abstract:

    In mobile ad hoc networks (MANETs), there is frequently disconnected a route consisting of multi- hop from a source to a destination because of the dynamic nature such as the topology change caused by nodes’ mobility. To overcome this situation, existing routing protocols for MANETs have performed route repair scheme to repair the disconnected route. However, existing reactive routing protocols have the problem which is that a source node unnecessarily performs re-discovers the whole path when just one node moves, even if the rest of path needs not to be re-arranged. Therefore, the time for re-discovery of the whole path may often take too long. To solve the problem, we propose a new local repair scheme using Promiscuous Mode. Our scheme is mainly composed of two parts: adaptive Promiscuous Mode and quick local repair scheme. Adaptive Promiscuous Mode is to repeat the switching processes between Promiscuous Mode and nonPromiscuous Mode to overcome energy limit caused by using Promiscuous Mode in overall time and quick local repair scheme is to fast perform the local re-route discovery process with the information of the active connection in the local area acquired by Promiscuous Mode. With simulation in the various number of connection, We demonstrate the better network performances achieved with the proposed schemes as compared with AODV as reference Model that do not provide local repair scheme.

  • a local repair scheme with adaptive Promiscuous Mode in mobile ad hoc networks
    2005
    Co-Authors: Doohyun Sung, Joo-sang Youn, Jihoon Lee, Chulhee Kang
    Abstract:

    In current routing protocols in ad hoc networks, a source node unnecessarily re-discovers the whole path when just one node moves, even if the rest of path needs not to be re-arranged. The time for re-discovery of the whole path may often take too long and affects the network efficiency adversely. In this paper, a local repair scheme has been proposed, where the source node recovers the route breakage caused by a shifting of node with an aid of adjacent node instead of re-routing the whole path. Adjacent nodes are under operation in adaptive Promiscuous Mode. Consequently, the proposed scheme has advantages in shortening the recovery time of the route breakage and in minimizing the energy consumption under Promiscuous Mode. The ns-2.27 simulator has been utilized for the evaluation of the proposed scheme.

Damandeep Kaur - One of the best experts on this subject based on the ideXlab platform.

  • An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode
    2014
    Co-Authors: Parminder Singh, Damandeep Kaur
    Abstract:

    Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes Promiscuous Mode method to detect and isolate the malicious node during wormhole attack by using Ad-hoc on demand distance vector routing protocol (AODV) with omnidirectional antenna. This paper proposes that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network. Keywords

  • various osi layer attacks and countermeasure to enhance the performance of wsns during wormhole attack
    2014
    Co-Authors: Damandeep Kaur, Parminder Singh
    Abstract:

    Wireless sensor networks are networks having non wired infrastructure and dynamic topology. In OSI Model each layer is prone to various attacks, which halts the performance of a network .In this paper several attacks on four layers of OSI Model are discussed and security mechanism is described to prevent attack in network layer i.e wormhole attack. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes Promiscuous Mode method to detect and isolate the malicious node during wormhole attack by using Ad-hoc on demand distance vector routing protocol (AODV) with omnidirectional antenna. The methodology implemented notifies that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network. We also notice that not only the same kind of attacks but also the same kind of countermeasures can appear in multiple layer. For example, misbehavior detection techniques can be applied to almost all the layers we discussed.

  • an approach to improve the performance of wsn during wormhole attack using Promiscuous Mode
    2013
    Co-Authors: Parminder Singh, Damandeep Kaur
    Abstract:

    Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes Promiscuous Mode method to detect and isolate the malicious node during wormhole attack by using Ad-hoc on demand distance vector routing protocol (AODV) with omnidirectional antenna. This paper proposes that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network.

Parminder Singh - One of the best experts on this subject based on the ideXlab platform.

  • An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode
    2014
    Co-Authors: Parminder Singh, Damandeep Kaur
    Abstract:

    Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes Promiscuous Mode method to detect and isolate the malicious node during wormhole attack by using Ad-hoc on demand distance vector routing protocol (AODV) with omnidirectional antenna. This paper proposes that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network. Keywords

  • various osi layer attacks and countermeasure to enhance the performance of wsns during wormhole attack
    2014
    Co-Authors: Damandeep Kaur, Parminder Singh
    Abstract:

    Wireless sensor networks are networks having non wired infrastructure and dynamic topology. In OSI Model each layer is prone to various attacks, which halts the performance of a network .In this paper several attacks on four layers of OSI Model are discussed and security mechanism is described to prevent attack in network layer i.e wormhole attack. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes Promiscuous Mode method to detect and isolate the malicious node during wormhole attack by using Ad-hoc on demand distance vector routing protocol (AODV) with omnidirectional antenna. The methodology implemented notifies that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network. We also notice that not only the same kind of attacks but also the same kind of countermeasures can appear in multiple layer. For example, misbehavior detection techniques can be applied to almost all the layers we discussed.

  • an approach to improve the performance of wsn during wormhole attack using Promiscuous Mode
    2013
    Co-Authors: Parminder Singh, Damandeep Kaur
    Abstract:

    Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes Promiscuous Mode method to detect and isolate the malicious node during wormhole attack by using Ad-hoc on demand distance vector routing protocol (AODV) with omnidirectional antenna. This paper proposes that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network.